Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Delivering Always-On Digital Experiences in Retail

How is it already near the end of October? We know our retailer customers have been heads-down thinking about code freezes and hypercare during the high season as we approach the holidays. Disruption and pivoting quickly to meet changing customer expectations is nothing new to the retail industry.

The Ultimate Guide to AWS Step Functions

The use of serverless computing has become a must nowadays, and some of you may already know a thing or two about Amazon Web Services like Lambda Functions, Step Functions, and other services AWS provides. However, if this is the first time you hear about them – fantastic! In this article, we’ll discuss AWS Step Functions, what they are used for, how to use them, and the advantages or disadvantages that they bring.

Build a Raspberry Pi Desktop with an Ubuntu heart

On the 22nd October 2020, Canonical released an Ubuntu Desktop image optimised for the Raspberry Pi. The Raspberry Pi Foundation’s 4GB and 8GB boards work out of the box with everything users expect from an Ubuntu Desktop. It is our honour to contribute an optimised Ubuntu Desktop image to the Raspberry Pi Foundation’s mission to put the power of computing into people’s hands all over the world.

How to Leverage File Monitoring as an Effective Breach Detection Tool

One thing that all organizations of any size need to realize is that data breaches only occur when there are not sufficient breach detection tools in place. Simply having a data loss prevention system does nothing unless you are actively using it to identify and stop a data breach from occurring. This is not to say that even with the best secure data solutions that your data is not at risk. Hackers are constantly evolving and adapting their methods, so you should never rest on your laurels.

LDAP authentication with Sensu Go: troubleshooting & tips

SSO is often accomplished by using Lightweight Directory Access Protocol (LDAP). While LDAP has a variety of use cases, in this post, I’ll focus on authentication — specifically, how to use LDAP authentication for single-sign on (SSO) with Sensu Go. First off, a quick overview of Sensu authentication.

Going Serverless: Best Practices

Making the move to serverless architecture? By accelerating app development time, serverless isn’t just a boon for business, it’s also a win for engineering teams. Gartner explains: “Serverless architectures enable developers to focus on what they should be doing — writing code and optimizing application design — making way for business agility and digital experimentation.”

Accenture and ServiceNow reimagine the future of business

Accenture and ServiceNow’s new partnership accelerates digital transformation and time to value for customers. Today’s business environment demands digitization. Specifically, digital workflows that transform how employees work, how customers receive service, and how work, well, flows. That’s because in the COVID-19 era, organizations are under pressure to innovate faster, reduce costs, improve productivity, and meet their customers’ needs.

TLDR InfluxDB Tech Tips; Creating Buckets with the InfluxDB API

Whether you’re using InfluxDB Cloud or InfluxDB OSS, the InfluxDB API provides a simple way to interact with your InfluxDB instance. The InfluxDB v2 API offers a unified approach to querying, writing data to, and assessing the health of your InfluxDB instances. In today’s Tech Tips post, we’re learning about how to create and list buckets. Buckets are named locations in InfluxDB where time series data is written to.

TLDR InfluxDB Tech Tips; Creating Tokens with the InfluxDB API

Whether you’re using InfluxDB Cloud or InfluxDB OSS, the InfluxDB API provides a simple way to interact with your InfluxDB instance. The InfluxDB v2 API, the read and write portions are available with InfluxDB v1.8+, offers a unified approach to querying, writing data to, and assessing the health of your InfluxDB instances. In today’s Tech Tips post, we learn how to create and list authentication tokens. Tokens provide secure data flow between an InfluxDB instance and its users.

Introducing Splunk Real User Monitoring (RUM)

A few days ago, I tried ordering lunch from a local restaurant. I went online, spent time looking at their menu, chose a few items, clicked “submit” and… got an error message. This experience is not unique. Earlier this week, when I tried to read the news, I got a message saying they’re experiencing a technical issue. You can see both messages below: We’ve all experienced such situations, and they can be very frustrating.